Please turn on your JavaScript for this page to function normally.
Most unauthorized data access goes undetected

With a focus primarily on large enterprise organizations, a Vormetric study of 700 IT security decision-makers indicates that there are major gaps between existing security …

The safest cloud apps for the enterprise

Enterprises today no longer have a choice about whether they embrace the cloud as their employees are already using cloud apps to perform critical business functions, often …

The Internet of Things will change everything

The Internet of Things (IoT) represents a new construct in the ICT world that is occupying the minds of IT vendors, service providers, and systems integrators as it represents …

Are workers drowning in a sea of ineffective technology?

With the rise of mobile, the cloud and multiple device use, today’s workers are more connected than ever before, giving them access to high-volume streams of information …

Connections between personality types and phishing

Phishing scams are some of the most effective online swindles, hooking both savvy and naive computer users. New insights from researchers at the Polytechnic Institute of New …

Over 50% don’t protect their Android devices

Over 50 percent of Android-based smartphone and tablet owners do not use any security software to protect their devices against cyber-threats, according to Kaspersky Lab. This …

The motives behind nation state driven cyber attacks

FireEye released a report that describes the unique international and local characteristics of cyber attack campaigns waged by governments worldwide. “Cyber weapons are …

Average online bank account is accessed by 2.4 unique devices

Each month, The ThreatMetrix Global Trust Intelligence Network (The Network) screens more than 500 million site visitors, across more than 1,900 customers and 9,000 websites …

Challenges faced by top CSOs

(ISC)2 released new data that outlines the chief challenges faced by top enterprise security executives and illustrates the broad range of complex – and sometimes …

Users want a seamless experience in public Wi-Fi

With smartphone and tablet usage continuing to explode, operator-deployed Wi-Fi networks are playing an increasing role in keeping users connected on the go. A new study …

Industry leaders perceive numerous security threats to their data

An overwhelming majority of business leaders believe their customers and clients worry about breaches of personal data held by their organizations. Unisys-sponsored research …

Organizations fear their privacy activities are insufficient

The perceived level of maturity attached to organizations’ privacy activities has decreased since 2011, as many organizations deem their existing privacy activities to …

Don't miss

Cybersecurity news